The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world because there is no efficient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS, Stern and KKS signature schemes are post-quantum secure because they are based on hard problems of coding theory. The purpose of this article is to describe what kind of attacks have been proposed against code-based constructions and what is missing
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quant...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
This thesis provides an overview of some known post-quantum cryptography schemes with special attent...
Cryptography has been used from time immemorial for preserving the confidentiality of data/informati...
DoctoralThese lecture notes have been written for courses given at École normale supérieure de Lyon ...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quant...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
This thesis provides an overview of some known post-quantum cryptography schemes with special attent...
Cryptography has been used from time immemorial for preserving the confidentiality of data/informati...
DoctoralThese lecture notes have been written for courses given at École normale supérieure de Lyon ...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...